Apple espionage on its employees iPhones and iCloud accounts
In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and...
Read more →In recent years, we have witnessed a growing trend of surveillance by various entities—ranging from individuals to state actors and...
Read more →An international law enforcement operation codenamed ‘Operation Passionflower’ has shut down MATRIX, an encrypted messaging platform used by cybercriminals to...
Read more →The notorious SmokeLoader malware has been identified targeting firms in Taiwan, including those in manufacturing, healthcare, information technology, and other...
Read more →A joint investigation team involving French and Dutch authorities has taken down Matrix, yet another end-to-end encrypted chat service created...
Read more →Microsoft has found itself on the receiving end of £1bn legal action, filed on behalf of thousands of UK businesses...
Read more →Authentication vulnerabilities are fun to find as they are impactful by nature and often grant unauthorized users access to various...
Read more →The cyber world needs your expertise. But the security leaders of tomorrow require a broad set of skills that job...
Read more →John Lee, a.k.a. John Threat, used the name “Corrupt” as a member of Masters of Deception (MOD), a New York based...
Read more →Dec 03, 2024Ravie LakshmananVulnerability / Network Security Cisco on Monday updated an advisory to warn customers of active exploitation of...
Read more →The CFPB’s idea of using existing US law to regulate data brokers is not novel. In February 2023, a group...
Read more →Phishers have come up with a new trick for bypassing email security systems: corrupted MS Office documents. The spam campaign...
Read more →Artificial intelligence (AI) is an obvious candidate to take some of the load off IT administrators. By using AI to automate...
Read more →